Click to add notes ibility: Investigate Methods of coverage Demonstration of Symmetric or Asymmetric cipher conce Individual Assignment on "Symmetric or Asymmetric ciphe . Choose appropriate algorithm to implement the encryption process in Python. Also demonstrate encryption and decryption process with a Notes Comments 10 H
Symmetric cipher:
Symmetric cipher model uses a secret-key or a single-key for encryption or decryption purposes. It employs a symmetric encryption, also known as conventional encryption single-key or secret-key encryption.
A few symmetric key algorithms are,
1. Data Encryption Standard (DES)
2. Triple DES (3DES)
3. International Data Encryption Algorithm (IDEA)
Symmetric cipher model:
1. Plaintext:
It refers to the original message that is not encrypted and is human readable. It forms an input to an encryption algorithm and output of or decryption algorithm.
Example:
A text document is an executable file or an image.
2. Encryption Algorithm:
Application of this algorithm will transform plaintext to an unreadable, unintelligible form by performing various transformations and substitutions.
3. Secret-key:
It is a piece of data that is randomly selected. It acts as an input to both the encryption and decryption algorithms. Therefore, both the sender and receiver must share the same key and make sure that it is secured, in order to restrict intruders from reading messages. The encryption algorithm performs the transformations and substitutions on the plaintext accordingly, depending on the key.
4. Cipher text:
It is a scrambled version of a plaintext and is not in a human-readable form. The cipher text produced by the encryption algorithm depends on the secret-key and the plain text. The encryption algorithm can produce different cipher text for the same plain text by using different secret-keys.
5. Decryption Algorithm:
It is a reversed form of encryption algorithm. It takes the cipher text (i.e., the encrypted data) as input and decrypts it, using the same key that was used by
Step by step
Solved in 3 steps